Buch, Englisch, 459 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g
16th International Conference, IHCI 2024, Twente, The Netherlands, November 13-16, 2024, Revised Selected Papers, Part I
Buch, Englisch, 459 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-88704-8
Verlag: Springer Nature Switzerland
This volume LNCS 15557 constitutes the refereed proceedings of 16th International Conference on Intelligent Human Computer Interaction, IHCI 2024, held in Twente, The Netherlands, during November 13-16, 2024.
The 37 full papers and 2 short papers were carefully reviewed and selected from 107 submissions. They were categorized under the topical sections as follows:
Learning in healthcare and wellbeing
Robots and conversation agents
Physical world and Posters
Human factors
Algorithims and computer vision
Human factors in cybersecurity
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Signalverarbeitung
- Technische Wissenschaften Elektronik | Nachrichtentechnik Elektronik
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Computeranwendungen in Geistes- und Sozialwissenschaften
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
Weitere Infos & Material
A VR experience exposing the hidden curriculum of the operating room a case study.- LifeCharger SynCare Mobile App: a preliminary usability study.- From Theory to Practice Simulation in Anesthesiology through Active Learning Experiences.- Methods for Optimizing Diagnostic Data for Patients with a Given Condition.- An Exploration of Phantom Touch as a Design Aspect to Enhance Wellbeing and Safety in Social VR.- Predictive Analytics for Stress Management in Nursing A Machine Learning Approach Using Wearable IoT Devices.- Robot-to-Robot Collaborative Knowledge Sharing with Human Operators under Constraint Resources through Connotative 2.5D Mapping.- Context aware Robotic Assistance for Workers using Intention Recognition and Semantic Digital Twin.- Conversational Agent Design A Comprehensive Analysis of Research from Leading Conferences.- Enhancing Firefighting Robot’s Capability A Comprehensive Implementation for Enhancing Firefighting Robot’s Operations.- A Novel Framework for Collaborative Knowledge Sharing and Learning for Disaster Response Robots.- More Human, Less Bot How Anthropomorphism Impacts User Experience in Customer Support Chatbots.- ‘I prefer robot cats!’ Reflections on robot animal like morphology from an in the wild Child Robot Interaction workshop.- Pipeline leak detection Leveraging Acoustic Emission Signal Processing and Machine Learning.- Application of Machine Learning Techniques for Leak Detection in a Horizontal Pipeline Transporting a Water Glycerol Mixture.- Connected lives Revolutionizing health and social interaction with wearable technology in India.- Online Monitoring System of Groundwater in the Aral Region Based on the Internet of Things.- Enhancing Meal Search Engine for Fitness Applications using Semantic Search with Sentence Transformers.- Addressing Graphviz File Generation Issue in CPN Tools: A Java based Solution.- What Does “Remote Driving” Mean for People A Futurespective Design Approach.- Controller adaptive Digital Assistant (CODA) Interim conclusions on the development of a new ATC system.- Reimagining the Utility of Dash Cam Data in Autonomous Travel Contexts A Service Design Proposal.- Keyframe Extraction based on Large Vision Transformer Model and kNN DBSCAN Clustering.- Improving Polyps Segmentation in Colonoscopy Images using Modified UNet3+ Network.- Scheduling for Lecturers using Genetic Algorithm with Fuzzy Constraints.- No Code Computer Vision.- Transfer Learning to Identify Multilingual Machine Genenrated Text.- A Novel Preprocessing Method for Transforming Federal Sentencing Data to Ensure Unbiased AI Adjudication Research Using Large Language Models.- Computational Analysis of User Experience of Password-Based Authentication Systems.- Computational Analysis of Human Factors in Spear Phishing Attacks An Adaptive Network Model.- Analysing the Rise of Biohacking in a Tech Driven City Assessing Risks through Adaptive Network Modeling.- An Adaptive Network Model to Analyse Cyber Security Understanding Cyber Threats in Financial Institutions.- Understanding Insider Threats Behaviour An Adaptive Network Model of The Evolution of an Insider Threat.- Organizational Response to APT Attacks Computational Analysis by Behavioral Network Modelling.- Adversarial Attack Detection In Intrusion Detection System Using Machine Learning.- Enhancing Data Privacy with Lattice-Based Encryption Technique.- Improving Threat Recognition in X-ray Security Inspection using Transformers.